中国科学院机构知识库网格
Chinese Academy of Sciences Institutional Repositories Grid
首页
机构
成果
学者
登录
注册
登陆
×
验证码:
换一张
忘记密码?
记住我
×
校外用户登录
CAS IR Grid
机构
软件研究所 [7]
采集方式
OAI收割 [7]
内容类型
期刊论文 [4]
会议论文 [3]
发表日期
2014 [1]
2012 [1]
2010 [2]
2009 [3]
学科主题
Computer S... [1]
Computer S... [1]
Informatio... [1]
计算机科学技术基础学... [1]
筛选
浏览/检索结果:
共7条,第1-7条
帮助
条数/页:
5
10
15
20
25
30
35
40
45
50
55
60
65
70
75
80
85
90
95
100
排序方式:
请选择
题名升序
题名降序
提交时间升序
提交时间降序
作者升序
作者降序
发表日期升序
发表日期降序
Known-key distinguishers on type-1 Feistel scheme and near-collision attacks on its hashing modes
期刊论文
OAI收割
Frontiers of Computer Science, 2014, 卷号: 8, 期号: 3, 页码: 513-525
Dong, Le (1)
;
Wu, Wenling (2)
;
Wu, Shuang (2)
;
Zou, Jian (2)
  |  
收藏
  |  
浏览/下载:30/0
  |  
提交时间:2014/12/16
known-key
block cipher
generalized Feistel scheme
type-1
rebound attack
integral distinguisher
algebraic degree
BOMM算法的密码学性质
期刊论文
OAI收割
软件学报, 2012, 卷号: 23, 期号: 7, 页码: 1899-1907
杨笑
;
范修斌
;
武传坤
;
余玉银
;
冯秀涛
  |  
收藏
  |  
浏览/下载:41/0
  |  
提交时间:2012/11/12
BOMM(byte-oriented memorial mixer)
Loiss
stream cipher
algebraic attack
period
A New Efficient Algorithm for Computing All Low Degree Annihilators of Sparse Polynomials with a High Number of Variables
会议论文
OAI收割
The Sixth International Conference on Information Security Practice and Experience Conference (ISPEC 2010), Seoul, Korea, 2010-5-12~2010-05-13
Lin Xu
;
Dongdai Lin
;
Xin Li
  |  
收藏
  |  
浏览/下载:8/0
  |  
提交时间:2010/06/10
algebraic attack
annihilator
algebraic immunity
boolean polynomial
computational algebra
a new efficient algorithm for computing all low degree annihilators of sparse polynomials with a high number of variables
会议论文
OAI收割
6th International Conference on Information Security Practice and Experience, Seoul, SOUTH KOREA, MAY 12-13,
Xu Lin
;
Lin Dongdai
;
Li Xin
  |  
收藏
  |  
浏览/下载:11/0
  |  
提交时间:2011/03/31
algebraic attack
annihilator
algebraic immunity
boolean polynomial
computational algebra
quadratic equations from a kind of s-boxes
会议论文
OAI收割
10th International Workshop on Information Security Applications, Busan, SOUTH KOREA, AUG 25-27,
Xie Jia
;
Cao Weiwei
;
Wang TianZe
  |  
收藏
  |  
浏览/下载:13/0
  |  
提交时间:2011/03/20
algebraic attack
Trace form representation
APN functions
power functions
Study of Probabilistic Scenarios of Algebraic Attacks on Stream Ciphers
期刊论文
OAI收割
Journal of Automation and Information Sciences, 2009, 卷号: 41, 期号: 2, 页码: 67-80
S.A. Pometun
  |  
收藏
  |  
浏览/下载:22/0
  |  
提交时间:2010/05/14
algebraic attack
stream cipher
Boolean function
algebraic immunity
vulnerable
complicating function
construction and enumeration of boolean functions with maximum algebraic immunity
期刊论文
OAI收割
SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2009, 卷号: 52, 期号: 1, 页码: 32-40
Zhang WenYing
;
Wu ChuanKun
;
Liu XiangZhong
  |  
收藏
  |  
浏览/下载:14/0
  |  
提交时间:2011/03/18
cryptography
algebraic attack
algebraic immunity
Boolean function